-
621
Deep Learning-Based Fingerprint–Vein Biometric Fusion: A Systematic Review with Empirical Evaluation
Published 2025-07-01Get full text
Article -
622
U-Net-based VGG19 model for improved facial expression recognition
Published 2025-06-01“…The improved model not only boosts performance in terms of feature extraction and fusion but is also adept in solving the pressing problems of parameter size and computational efficiency. …”
Get full text
Article -
623
Mitigating Online Banking Fraud Using Machine Learning and Anomaly Detection
Published 2025-06-01Get full text
Article -
624
Lightweight Attention-Based CNN Architecture for CSI Feedback of RIS-Assisted MISO Systems
Published 2025-07-01Get full text
Article -
625
Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols
Published 2025-04-01“…Its one-round exchange model and resistance to both passive and active attacks make it particularly well-suited for constrained devices and dynamic network topologies. The originality of the proposal lies in embedding OWL directly into protocols like CoAP, enabling secure session establishment as a native feature rather than as an auxiliary security layer. …”
Get full text
Article -
626
-
627
Smart intrusion detection model to identify unknown attacks for improved road safety and management
Published 2025-05-01“…ACIDS integrates convolutional neural networks (CNN) for hierarchical feature extraction, the synthetic minority over-sampling technique (SMOTE) to address class imbalance and an open-set classification framework to detect novel attack patterns. …”
Get full text
Article -
628
Online Face Detection and Recognition in a Video Stream
Published 2013-12-01“…In this work a system is designed for Online Face Detection and Recognition depending on multiple algorithms that are: AdaBoost algorithm for the face detection and the two algorithms Principle Component Analysis (PCA) and Linear Discriminate Analysis (LDA) to extract features and use back propagation neural network in recognition. …”
Get full text
Article -
629
-
630
Deep CNN based brain tumor detection in intelligent systems
Published 2024-01-01Get full text
Article -
631
-
632
-
633
-
634
Malicious Traffic Detection on Tofino Using Graph Attention Model
Published 2025-06-01Get full text
Article -
635
Performance Evaluation of Various Deep Learning Models in Gait Recognition Using the CASIA-B Dataset
Published 2024-12-01Get full text
Article -
636
Enhancing plant disease detection through deep learning: a Depthwise CNN with squeeze and excitation integration and residual skip connections
Published 2025-01-01“…The architectural modifications are specifically designed to enhance feature extraction and classification performance, all while maintaining computational efficiency. …”
Get full text
Article -
637
Spiking Residual ShuffleNet-Based Intrusion Detection in IoT Environment
Published 2025-01-01“…The Internet of Things (IoT) system has been developed to create a smart environment. Privacy and security are critical issues in IoT systems. Security vulnerabilities in IoT-enabled models generate threats that impact various applications. …”
Get full text
Article -
638
-
639
Research on multi-user identity recognition based on Wi-Fi sensing
Published 2024-03-01“…With the advancement of wireless sensing technology, research on Wi-Fi-based identity recognition has garnered significant attention in fields such as human-computer interaction and home security.While identity recognition based on Wi-Fi signals has achieved initial success, it is currently primarily suitable for scenarios involving individual user behavior.Identity recognition for multiple users in concurrent behavior scenarios still faces a series of challenges, including issues related to mutual interference between users and poor model robustness.Therefore, a Wiblack system for recognizing multiple user identities in a concurrent distribution behavior scenario was proposed.The core idea was to train a multi-branch deep neural network (Wiblack-Net) to extract unique features for each individual user.Firstly, the common features among multiple users were extracted using the backbone network.Then, a binary classifier was assigned to each user to determine the presence of the target user within a given group, thereby achieving identity recognition for multiple users based on concurrent behavior.In addition, experiments comparing Wiblack with several independent binary classification models and a single multiclassification model were conducted to analyze operational efficiency.System performance experimental results demonstrate that when simultaneously identifying the identities of three users, Wibalck achieves an average accuracy of 92.97%, an average precision of 93.71%, an average recall of 93.24%, and an average F1 score of 92.43%.…”
Get full text
Article -
640
Deep Learning-Based Image Watermarking Using Catalan Transform and Non-Negative Matrix Factorization
Published 2025-01-01“…Security metrics include RE = 0.3094, UACI = 34.21%, and NPCR = 99.15%, demonstrating superior robustness and efficiency over existing approaches.…”
Get full text
Article